thru communications in a dynamic environment, where both the channel contention ... management, instant messaging, and media content delivery, have been ...
Dynamic Optimal Random Access for Vehicle-to-Roadside Communications Man Hon Cheung∗ , Fen Hou† , Vincent W.S. Wong∗ , and Jianwei Huang† ∗ Department
of Electrical and Computer Engineering, The University of British Columbia, Vancouver, Canada † Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong, China Emails: ∗ {mhcheung, vincentw}@ece.ubc.ca, † {fhou, jwhuang}@ie.cuhk.edu.hk Abstract—In a drive-thru scenario where vehicles drive by a roadside access point (AP) to obtain temporary Internet access, it is important to design efficient resource allocation schemes to fully utilize the limited communication opportunities. In this paper, we study the random access problem in drivethru communications in a dynamic environment, where both the channel contention level and channel capacity vary over time. We assume that a vehicle has a file to upload when it is within the coverage range of the AP. The vehicle will pay a fixed amount each time it tries to access the AP, and will incur a penalty if it cannot finish the file uploading when leaving the AP. We first formulate the optimal transmission problem as a finite-horizon sequential decision problem. Then we solve the problem using dynamic programming, and design a dynamic optimal random access algorithm. Simulation results based on a realistic vehicular traffic model show that our algorithm achieves the minimal total cost, the highest probability of completing file upload, and the highest upload ratio as compared with two other heuristic schemes.
I. I NTRODUCTION The development of intelligent transportation system (ITS) has gained significant momentum in recent years, especially after the Federal Communications Commission (FCC) in the United States allocated 75 MHz licensed spectrum in the 5.9 GHz band in 1999 for this purpose. There are two types of application in an ITS. Safety applications, such as cooperative forward collision warning, lane change warning, and left turn assistant (e.g., [1], [2]), have been proposed to improve the safety of the passengers by informing the vehicles of potential dangers ahead of time. Non-safety applications, such as traffic management, instant messaging, and media content delivery, have been designed to avoid traffic congestion and improve the experience of driving. Vehicular ad hoc networks (VANETs), which are designed to provide reliable communications among vehicles and roadside access points (APs), are playing an important role in the development of ITS. VANETs support the ITS applications through different types of communication patterns, including vehicle-to-roadside (V2R) and vehicle-to-vehicle (V2V) communications [3]. V2R communications involve data transmissions between vehicular nodes and roadside APs, and V2V communications involve data exchange among vehicular nodes only. For both types, we can further classify the communications as either single-hop or multi-hop. In this paper, we focus
on single-hop V2R uplink transmission from the vehicles to the AP. Due to the limited communication opportunities between the AP and the vehicles, efficient resource allocation in V2R communications is crucial for the successful deployment of ITS applications. A number of previous results have been reported on the resource allocation in V2R communications. Zhang et al. in [4] considered the case where roadside APs only store the data uploaded by the vehicles. Scheduling priority is determined by two factors: data size and deadline. A request with a smaller data size or an earlier deadline will be served first. Hadaller et al. in [5] proposed a scheduling protocol that grants channel access to a vehicle with the maximum transmission rate. Analytical and simulation results showed significant overall system throughput improvement over a benchmark scheme. Jarupan et al. in [6] proposed a cross-layer protocol for V2R multi-hop communication. The medium access control (MAC) module collects information of local data traffic, and the routing module finds a route with the minimum delay. Niyato et al. in [7] considered the coalition formation of vehicles to improve bandwidth utilization. Coalitions based on either maximizing the individual utility or the aggregate utility were studied. Tan et al. in [8] analyzed the performance of a downlink resource allocation scheme in a V2R communication system with one AP on a road. The distribution of the number of bytes downloaded per drive-thru was derived using Markov reward processes. Most of these results only proposed heuristic resource allocation schemes in VANETs. This motivates us to design an optimal uplink resource allocation scheme analytically. Moreover, we aim to design a random access algorithm that is distributed in nature, so that it is compatible with the IEEE 802.11p standard which is developed to facilitate the provision of wireless access in vehicular networks [9]. In this work, we consider the drive-thru scenario [10], where vehicles pass by an AP located along the road, and obtain Internet access for only a limited amount of time. We assume that a vehicle wants to upload a file to the AP when it is within the coverage range of the AP. The AP charges the vehicle in proportion to the number of time slots that it requests for packet transmission. It also provides the vehicle with information on the current contention level within the
where νf is the free-flow speed when the vehicle is moving on the road without any other vehicles, and ρmax is the vehicle density during traffic jam. As we are studying the traffic flow in the steady state, all the vehicles within the coverage range are assumed to move with the same speed ν in (2). The sojourn time of each vehicle in the coverage range of the AP is given by Fig. 1.
Tsoj = 2R/ν.
Drive-thru vehicle-to-roadside (V2R) communications.
coverage range. The vehicle needs to decide when to transmit by taking into account the required payment, the probability of completing file upload, and the level of contention within the coverage range. The main contributions of our work are as follows: • Problem formulation: We formulate the optimal transmission problem as a finite-horizon sequential decision problem. • Algorithm design: We apply dynamic programming to design an optimal random access algorithm for this dynamic scenario. • Performance evaluation: Simulation results show that our proposed algorithm achieves the minimal total cost, the highest probability of completing file upload, and the highest upload ratio as compared with two other heuristic schemes. The rest of the paper is organized as follows. We describe our system model in Section II, and formulate our problem as a finite-horizon sequential decision problem in Section III. Our dynamic programming based algorithm is proposed in Section IV. Simulation results are given in Section V, and the paper is concluded in Section VI. II. S YSTEM M ODEL We consider a drive-thru scenario as shown in Fig. 1, where an AP is installed on a highway to provide Internet services to vehicles within its coverage range. We assume that the AP has a transmission radius R. We focus on the uplink transmission from a vehicle to the AP, where the vehicle wants to upload a file of size S when it moves through the coverage range of the AP. A. Traffic Model Let λ be the average number of vehicles passing by the fixed AP per unit time. We assume that the number of vehicles moving into the coverage range of the AP follows a Poisson process with mean arrival rate λ. Let ρ be the vehicle density representing the number of vehicles per unit distance along the road segment, and ν be the speed of the vehicles. From [11], we have λ = ρν. (1) The relation between the vehicle density ρ and speed ν is given by the following equation [11]: ν = νf (1 − ρ/ρmax ),
(2)
(3)
The maximum number of vehicles that can be accommodated in the segment of the coverage range is given by Nmax = 2Rρmax ,
(4)
where · denotes the floor function. B. Channel Model Wireless signal propagations suffer from path loss, shadowing, and fading. Since the distance between the vehicle and the AP varies over time in the drive-thru scenario, the dominant effect of channel attenuation is the path loss attenuation. The channel capacity at time slot t is given by P wt = W log2 1 + , (5) N0 W dγt where W is the channel bandwidth, P is the transmit power of the vehicle, dt is the distance between the AP and vehicle at time slot t, and γ is the path loss exponent. We assume that the additive white Gaussian noise has a zero mean and a power spectral density N0 /2. C. System Operations We consider a slotted MAC protocol where time is divided into equal time slots of length Δt. We assume that there is perfect synchronization between the AP and the vehicles with the use of global positioning system (GPS). The total number of time slots that the vehicle stays within the coverage range 2R . We define the set of time slots as of the AP is T = νΔt T = {0, . . . , T − 1}. When the vehicle first enters the coverage range of the AP, it declares to the AP the type of application that it supports. In return, the AP provides the vehicle with information related to the channel contention in the system (λ and psucc ), channel capacity in all the time slots (wt , ∀ t ∈ T ), the price (q), and the estimated number of vehicle departures from the coverage range in all the time slots (lt , ∀ t ∈ T ). We further elaborate these system parameters as follows: succ • p represents the probability that a vehicle can successfully gain assess to the current time slot for data transmission when all the vehicles in the coverage range contend for this time slot. psucc is estimated by the AP to indicate the level of system contention and it varies over time. Since the level of system contention is related to the number of vehicles n in the coverage range, we define psucc = f (n), where f is a strictly decreasing function of n. The AP knows the value of n, since vehicles need
to establish and terminate their connections when they enter and leave the coverage range, respectively. • q ≥ 0 denotes the payment of a vehicle to the AP for each time slot that it sends a transmission request. • lt represents the number of vehicle departures at time slot t. Since the vehicles move with constant speed ν in the traffic model, we assume that (lt , ∀ t ∈ T ) are accurately known by the AP, and are sent to the vehicle when it enters the coverage range. In each time slot, the AP first broadcasts the value of psucc . If a vehicle decides to transmit within this time slot, it then sends a request to the AP at its scheduled minislot, where Nmax mini-slots are reserved for transmission requests. The transmissions of requests are thus collision-free. After collecting the requests from the vehicles in the coverage range, the AP assigns this time slot to one of these vehicles based on the psucc announced. The vehicle, which receives the acknowledgement (ACK), can transmit the data packets in the remaining time Δtdata of this time slot, where Δtdata < Δt. Meanwhile, regardless of which vehicle is granted the time slot, each vehicle sending a request in the time slot will pay q to the AP. Without such pricing, the vehicle would send requests in every time slots, which prevents the efficient allocation of time slots to the most needed application. The vehicle aims to achieve a good tradeoff between file upload completion and the total payment to the AP: If it waits until it is close to the AP and the channel is better, it may finish uploading the file within a small number of time slots and thus with a small amount of payment. However, if it starts to transmit too late, then there may not be enough time to finish the file upload before leaving the coverage range. This is true especially when psucc is low, the file size S is large, and the total number of time slots T is small (e.g., due to high vehicle speed ν). Therefore, it is very challenging for vehicles to decide when to request for data transmission. III. P ROBLEM F ORMULATION In this section, we formulate the problem of finding the optimal transmission policy of the vehicle as a finite-horizon sequential decision problem [12]. The decision epochs are t ∈ T = {0, . . . , T − 1}.
(6)
), where the The state of the system is defined as (s, p state element s ∈ S = [0, S] represents the remaining size (in bits) of the file to be uploaded. For t ∈ T , the number of vehicles in the coverage range of the AP is n ∈ N = {1, . . . , Nmax }. So P = {f (n) : n ∈ N }. At any state (s, psucc ), the vehicle has two possible actions: succ
a ∈ A = {0, 1},
(7)
where action a = 1 implies that the vehicle decides to request to transmit, and action a = 0 otherwise. Notice that A is the set of possible actions and is independent of time. The cost at state (s, psucc ) with chosen action a at time slot t is (8) ct (s, psucc , a) = aq, ∀ t ∈ T .
After the vehicle has left the coverage range at time slot T , we define the self-incurred penalty of the vehicle for not being able to finish the file uploading as cˆT (s, psucc ) = h(s),
(9)
where h(s) ≥ 0 is a nondecreasing function of s with h(0) = 0. The function is chosen depending on the quality of service (QoS) requirement of the application. The state transition probability pt (s , psucc ) | (s, psucc ), a is the probability that the system will go into state (s , psucc ) if action a is taken at state (s, psucc ) at time slot t. Since the transition from psucc to psucc is independent of the value of s, we have ), a pt (s , psucc ) | (s, psucc (10) = pt s | (s, psucc ), a pt psucc | psucc . With action a = 1, we have ⎧ succ ⎪ , if s = [s − wt Δtdata ]+, ⎨p pt s | (s, psucc ), 1 = 1 − psucc , if s = s, ⎪ ⎩ 0, otherwise, (11) where [x]+ = max{0, x}. The first and second cases correspond to the scenarios of successful and unsuccessful packet transmissions, respectively. With action a = 0, we have 1, if s = s, succ ), 0 = pt s | (s, p (12) 0, otherwise, where the size of the remaining file to upload does not change. For the transition probability of psucc , we have pt psucc | psucc = pt f (n ) | f (n) = pt n | n (λΔt)n −n+lt+1 , if n − lt+1 ≤ n ≤ Nmax , = (n −n+lt+1 )! φ(n,t) 0, otherwise,
(13)
Nmax −n+lt+1 (λΔt)y is a normalization where φ(n, t) = y=0 y! factor. As shown in the first line of (13), because psucc = f (n) is a strictly decreasing function of n, there is a one-to-one mapping between psucc and n. The second line describes the probability with n − n + lt+1 arrivals due to the Poisson process and lt+1 deterministic departures at time t + 1. n is lower-bounded by n − lt+1 ≥ 0 when there is no vehicle arrival, and is upper-bounded by Nmax . Let δt : S × P → A be a function that specifies the transmission decision of the vehicle at state (s, psucc ) at time slot t. We define a policy as π = (δt (s, psucc ), ∀ s ∈ succ,π ) as the state at S, psucc ∈ P, t ∈ T ). We denote (sπ t , pt time slot t if policy π is used, and we let Π be the feasible set of π. The vehicle aims to find an optimal policy π ∗ that minimizes the total expected cost when it is within the coverage range of the AP, which can be formulated as the
Algorithm 1 Dynamic Optimal Random Access Algorithm.
following optimization problem T −1 π succ,π π succ,π min Eπ,(S,psucc c , p , δ (s , p ) s t t ) t t t t 0 π∈Π
(14)
t=0
succ,π +ˆ cT (sπ ) T , pT
,
where Eπ,(S,psucc ) denotes the expectation with respect to 0 the probability distribution by policy π with an initial state ). (S, psucc 0 IV. F INITE -H ORIZON DYNAMIC P ROGRAMMING In this section, we solve problem (14) using the finitehorizon dynamic programming. This leads to a dynamic optimal random access algorithm that results in the minimal total cost in problem (14). Let vt (s, psucc ) be the minimal expected total cost that the vehicle has to pay from time slot t to T , given that the system is in state (s, psucc ) immediately before the decision at time slot t. The optimality equation [12, pp. 83] relating the minimal expected total cost at different states for t ∈ T is vt (s, psucc ) = min{ψt (s, psucc , a)}, a∈A
ψt (s, psucc , a) = ct (s, psucc , a)+ pt (s , psucc ) | (s, psucc ), a vt+1 (s , psucc ). (16) s ∈S psucc ∈P
The first and second terms on the right hand side of (16) are the immediate cost and the expected future cost in the remaining time slots for choosing action a, respectively. For t = T , we have the boundary condition that (17)
The value of ψt (s, psucc , 0) and ψt (s, psucc , 1), ∀ t ∈ T , can be obtained as follows: Lemma 1: Nmax −n+lt+1
ψt (s, p
succ
, 0) =
(λΔt)m m! φ(n, t)
m=0 × vt+1 s, f (n + m − lt+1 ) ,
(18)
and Nmax −n+lt+1
ψt (s, psucc , 1) =q +
6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23:
Planning Phase: Set vT (s, psucc ), ∀ s ∈ S, ∀ psucc ∈ P, using (17) Set t := T − 1 while t ≥ 0 Calculate ψt (s, psucc , 0) and ψt (s, psucc , 1) ∀ s ∈ S, ∀ psucc ∈ P, using (18) and (19), respectively Set δt∗ (s, psucc ), ∀ s ∈ S, ∀ psucc ∈ P, using (20) Calculate vt (s, psucc ), ∀ s ∈ S, ∀ psucc ∈ P, using (15) Set t := t − 1 end while Transmission Phase: Set t := 0 and s := S while t ≤ T − 1 Receive the information of psucc from the AP Set action a := δt∗ (s, psucc ) based on the policy π ∗ If a = 1 Send a request to the AP If ACK is received from the AP Transmit packets with total size wt Δtdata Set s := [s − wt Δtdata ]+ end if end if Set t := t + 1 end while
(15)
where
vT (s, psucc ) = cˆT (s, psucc ) = h(s).
1: 2: 3: 4: 5:
(λΔt)m m! φ(n, t)
m=0 succ × p vt+1 [s − wt Δtdata ]+ , f (n + m − lt+1 ) + (1 − psucc )vt+1 s, f (n + m − lt+1 ) , (19)
where n = f −1 (psucc ). Proof: The results follow directly by evaluating ψt (s, psucc , a) in (16) using (10)-(13) for the cases a = 0 and a = 1.
Using the optimality equation and backward induction [12, pp. 92], we are ready to obtain the optimal policy π ∗ . First, we obtain vt (s, psucc ), ∀ s ∈ S, psucc ∈ P, by updating it recursively from time slot t = T − 1 to time slot t = 0 using (15)-(17). The optimal policy is described in Theorem 1, and is obtained as in the planning phase in Algorithm 1. Theorem 1: We define the policy π ∗ = (δt∗ (s, psucc ), ∀ s ∈ S, psucc ∈ P, t ∈ T ) where 1, if ψt (s, psucc , 0) > ψt (s, psucc , 1), ∗ succ )= δt (s, p 0, otherwise, (20) which is updated recursively from t = T − 1 to t = 0. It is the optimal solution of problem (14). Proof: The decision rule in (20) corresponds to the decision in the optimality equation in (15). Using the principle of optimality [13, pp. 18], we can show that π ∗ is the optimal solution of problem (14). As a result, π ∗ is a contingency plan that contains information about the optimal decision at all the states (s, psucc ). We then propose our dynamic optimal random access algorithm in Algorithm 1. In the planning phase, the optimal policy π ∗ is computed offline using dynamic programming. In the transmission phase, transmission decisions are made according to the optimal policy π ∗ , and s is updated depending on whether the time slot is granted to the vehicle for transmission or not. V. P ERFORMANCE E VALUATIONS In this section, we evaluate the performance of Algorithm 1 by comparing it with two heuristic schemes using the traffic model described in Section II-A. The first scheme is a greedy
TABLE I S IMULATION PARAMETERS
90 80
Values
70
AP’s transmission radius R
100 m
60
Free-flow speed νf
110 km/hr
Vehicle jam density ρmax
100 veh/km
Duration of a time slot Δt
0.02 sec
Duration for data transmission in a time slot Δtdata
0.018 sec
Bandwidth W
20 MHz
Transmit signal-to-noise ratio Path loss exponent γ
P N0 W
Total Cost
Parameters
Exponential Backoff Greedy Optimal Random Access
50 40 30 20 10 0 100
60 dB
150
200
250
300
350
400
450
500
File Size S (Mbits)
3
Payment per time slot q
0.005
Self-incurred penalty h(s) = K, ∀s > 0
100
Contention window cw ∈ [cwmin , cwmax ]
[1, 8]
Fig. 2. Total cost versus file size S for ν = 100 km/hr. The optimal random access scheme has the minimal total cost (i.e., the total payment to the AP plus the self-incurred penalty).
algorithm, in which each vehicle sends transmission requests at all the time slots if its file upload is not complete. That is, the greedy algorithm aims to maximize the probability of completing file upload. The second scheme is the exponential backoff algorithm that is similar to the one used in the IEEE 802.11. We have slightly modified it for the system that we consider as follows. Each vehicle has a counter, which randomly and uniformly chooses an initial integer value cnt from the interval [0, cw), where cw is the contention window size. The value of cnt decreases by one after every time slot. When cnt = 0, the vehicle will send a request. If the vehicle has sent a request in a time slot, the size of cw ∈ [cwmin , cwmax ] changes according to the response from the AP. If an ACK is received from the AP, cw = cwmin . Otherwise, cw is doubled until it reaches cwmax . For performance evaluation, we run each experiment in 1000 different network scenarios and take the average value. We assume that the vehicle under consideration sends the transmission requests based on the given scheme. The requests are sent using the allocated mini-slots. We assume that the AP allows the vehicles to share the channel with equal probability. Therefore, psucc = f (n) = 1/n equals to the probability that the vehicle can successfully obtain a time slot. We consider a safety application with a strict delay requirement, where the whole file must be uploaded when the vehicle is within the coverage range since the partially uploaded data is useless. We set the self-incurred penalty as K, if s > 0, h(s) = (21) 0, if s = 0, where K is a positive constant. By setting K >> q, we place a higher importance on completing the file upload than on minimizing the total payment. The three schemes are evaluated using a similar transmission phase as in Algorithm 1, but with δt∗ (s, psucc ) in line 14 replaced by the corresponding policies. The simulation parameters are listed in Table I. First, we plot the total cost and the probability of completing file upload against the file size S with ν = 100 km/hr in Figures. 2 and 3, respectively. It is clear from Fig. 2 that
Probability of Completing File Upload
1 Optimal Random Access Greedy Exponential Backoff
0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 100
150
200
250
300
350
400
450
500
File Size S (Mbits)
Fig. 3. Probability of completing file upload versus file size S for ν = 100 km/hr. Notice that the greedy scheme aims to achieve the highest probability of completing file upload by design. The optimal random access scheme achieves the same optimal performance as this benchmark scheme.
our proposed scheme achieves the minimal total cost as stated in Theorem 1. In Fig. 3, we take the greedy scheme as the benchmark. We can observe that the optimal random access achieves the same probability of completing file upload as this benchmark scheme. To measure the cost effectiveness of the file upload completion for the three schemes, we propose a metric called the upload ratio, which is equal to the probability of completing file upload divided by the total payment to the AP. In other words, it represents the chance of completing file upload that a vehicle can achieve per unit payment. Since optimal random access has the highest probability of completing file upload, while maintaining a small payment to the AP, it achieves the highest upload ratio as shown in Fig. 4. Next, we study the impacts of traffic density ρ on the total cost, the probability of completing file upload, and the upload ratio against ρ for the file size S = 200 Mbits in Figures. 5, 6, and 7, respectively. We can see that the optimal random access scheme has the minimal total cost, the highest probability of completing file upload, and the highest upload ratio across different ρ. It is interesting to note that the total cost is small and the probability of completing file upload is high at both the very low and very high traffic densities cases. First, for a low ρ, the channel contention is small and the chance of completing the file upload is relatively high, which results in
2
1
Probability of Completing File Upload
Optimal Random Access Greedy Exponential Backoff
1.8 1.6
Upload Ratio
1.4 1.2 1 0.8 0.6 0.4 0.2 0 100
150
200
250
300
350
400
450
0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 10
500
Optimal Random Access Greedy Exponential Backoff
0.9
20
30
File Size S (Mbits)
Fig. 4. Upload ratio (i.e., probability of completing file upload / total payment to the AP) versus file size S for ν = 100 km/hr. The optimal random access scheme achieves the highest upload ratio.
40
50
60
Density ρ (veh/km)
70
80
90
Fig. 6. Probability of completing file upload versus traffic density ρ for file size S = 200 Mbits. 1 Optimal Random Access Greedy Exponential Backoff
0.9
120
0.8 100
Upload Ratio
0.7
Total Cost
80
60
0.6 0.5 0.4 0.3
40
0.2 0.1
20
0 10
Exponential Backoff Greedy Optimal Random Access 20
30
40
50
0 10 60
Density ρ (veh/km)
70
80
90
Fig. 7. Fig. 5.
20
30
40
50
60
Density ρ (veh/km)
70
80
90
Upload ratio versus traffic density ρ for file size S = 200 Mbits.
Total cost versus traffic density ρ for file size S = 200 Mbits.
R EFERENCES a small total cost. On the other hand, for a high ρ, the speed of the vehicle ν is low due to (2), which results in a large sojourn time Tsoj due to (3). As a result, the vehicle has more time to upload the file, which contributes to the high probability of completing file upload and thus a small total cost. However, the upload ratio is low due to the large payment required when the channel contention is heavy. VI. C ONCLUSION In this paper, we studied V2R uplink transmission in a dynamic drive-thru scenario, where both the channel contention level and channel capacity vary over time. We proposed an optimal random access algorithm based on the analysis of finite-horizon dynamic programming. Simulation results show that our scheme achieves the minimal total cost, the highest probability of completing file upload, and the highest upload ratio comparing with two other heuristic schemes. For future work, we will consider the setting with multiple APs, where coordination among APs is required for the file upload. ACKNOWLEDGMENT This research is funded by AUTO21, a member of the Network of Centres of Excellence of Canada program. It is also supported by the General Research Funds (Project Number 412509) established under the University Grant Committee of the Hong Kong Special Administrative Region, China, and the Global Scholarship for Research Excellence of the Chinese University of Hong Kong.
[1] H. Hartenstein and K. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Communications Magazine, vol. 46, no. 6, pp. 164–171, June 2008. [2] Y. Toor, P. Muhlethaler, A. Laouiti, and A. De La Fortelle, “Vehicle ad hoc networks: Applications and related technical issues,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 74–88, 2008. [3] E. Hossain, G. Chow, V. C. M. Leung, R. D. McLeod, J. Misic, V. W. S. Wong, and O. Yang, “Vehicular telematics over heterogeneous wireless networks: A survey,” Elsevier Computer Communications, vol. 33, no. 7, pp. 775–793, May 2010. [4] Y. Zhang, J. Zhao, and G. Cao, “On scheduling vehicle-roadside data access,” in Proc. of ACM International Workshop on VANETs, Montreal, Quebec, Canada, Sept. 2007. [5] D. Hadaller, S. Keshav, and T. Brecht, “MV-MAX: Improving wireless infrastructure access for multi-vehicular communication,” in Proc. of ACM SIGCOMM Workshop, Pisa, Italy, Sept. 2006. [6] B. Jarupan and E. Ekici, “Location- and delay-aware cross-layer communication in V2I multihop vehicular networks,” IEEE Communications Magazine, vol. 47, no. 11, pp. 112–118, Nov. 2009. [7] D. Niyato, P. Wang, W. Saad, and A. Hjorungnes, “Coalition formation games for bandwidth sharing in vehicle-to-roadside communications,” in Proc. of IEEE WCNC, Sydney, Australia, Apr. 2010. [8] W. L. Tan, W. C. Lau, and O. Yue, “Modeling resource sharing for a road-side access point supporting drive-thru Internet,” in Proc. of ACM International Workshop on VANETs, Beijing, China, Sept. 2009. [9] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11p, 2010. [10] J. Ott and D. Kutscher, “Drive-thru Internet: IEEE 802.11b for automobile users,” in Proc. of IEEE INFOCOM, Hong Kong, China, Mar. 2004. [11] J. D. Fricker and R. K. Whitford, Fundamentals of Transportation Engineering: A Multimodal Systems Approach. Prentice Hall, 2004. [12] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. New York, NY: John Wiley and Sons, 2005. [13] D. P. Bertsekas, Dynamic Programming and Optimal Control: Volume 1, 2nd ed. Athena Scientific, 2000.